[1] |
ARMBRUST M , FOX A , GRIFFITH R ,et al. A view of cloud computing[J]. Communications of the ACM, 2010,53(4): 50-58.
|
[2] |
YU Y , LI Y N , AU M H ,et al. Public cloud data auditing with practical key update and zero knowledge privacy[M]// Information security and privacy. Cham: Springer International Publishing, 2016: 389-405.
|
[3] |
KAMARA S , LAUTER K . Cryptographic cloud storage[M]// Financial cryptography and data security. Heidelberg: Springer, 2010: 136-149.
|
[4] |
ARORA R , PARASHAR A . Secure user data in cloud computing using encryption algorithms[J]. International Journal of Engineering Research and Applications, 2013,3(4): 1922-1926.
|
[5] |
SONG D X , WAGNER D , PERRIG A . Practical techniques for searches on encrypted data[C]// Proceeding of 2000 IEEE Symposium on Security & Privacy. Piscataway:IEEE Press, 2000.
|
[6] |
BONEH D , DI CRESCENZO G , OSTROVSKY R ,et al. Public key encryption with keyword search[C]// Proceeding of 2004 International Conference on The Theory and Applications of Cryptographic Techniques. Heidelberg:Springer, 2004: 506-522.
|
[7] |
MIAO Y B , MA J F , LIU X M ,et al. m2-ABKS:attribute-based multi-keyword search over encrypted personal health records in multi-owner setting[J]. Journal of Medical Systems, 2016,40(11): 1-12.
|
[8] |
ZHANG R , XUE R , YU T ,et al. PVSAE:a public verifiable searchable encryption service framework for outsourced encrypted data[C]// Proceedings of 2016 IEEE International Conference on Web Services (ICWS). Piscataway:IEEE Press, 2016: 428-435.
|
[9] |
SUN W H , YU S C , LOU W J ,et al. Protecting your right:verifiable attribute-based keyword search with fine-grained owner-enforced search authorization in the cloud[J]. IEEE Transactions on Parallel and Distributed Systems, 2016,27(4): 1187-1198.
|
[10] |
MIAO Y B , MA J F , LIU X M ,et al. Practical attribute-based multi-keyword search scheme in mobile crowdsourcing[J]. IEEE Internet of Things Journal, 2018,5(4): 3008-3018.
|
[11] |
MIAO Y B , MA J F , LIU X M ,et al. Attribute-based keyword search over hierarchical data in cloud computing[J]. IEEE Transactions on Services Computing, 2020,13(6): 985-998.
|
[12] |
BETHENCOURT J , SAHAI A , WATERS B . Ciphertext-policy attribute-based encryption[C]// Proceedings of 2007 IEEE Symposium on Security and Privacy (SP’07). Piscataway:IEEE Press, 2007: 321-334.
|
[13] |
ZHENG Q J , XU S H , ATENIESE G . VABKS:Verifiable attribute-based keyword search over outsourced encrypted data[C]// Proceedings of IEEE INFOCOM 2014-IEEE Conference on Computer Communications. Piscataway:IEEE Press, 2014: 522-530.
|
[14] |
张晓敏 . 基于布隆过滤器属性基的多关键词可搜索方案[J]. 计算机与现代化, 2021(8): 104-111.
|
|
ZHANG X M . An attribute-based multi-keyword searchable scheme based on Bloom filters[J]. Computer and Modernization, 2021(8): 104-111.
|
[15] |
李志单 . 云存储中基于属性加密的数据访问控制和隐私保护研究[D]. 北京:北京邮电大学, 2020.
|
|
LI Z D . Research on data access control and privacy protection based on attribute-based encryption in cloud storage[D]. Beijing:Beijing University of Posts and Telecommunications, 2020.
|